Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Physical Sciences and Mathematics

Protein Secondary Structure Prediction Using Parallelized Rule Induction From Coverings, Leong Lee, Cyriac Kandoth, Jennifer Leopold, Ronald L. Frank Dec 2009

Protein Secondary Structure Prediction Using Parallelized Rule Induction From Coverings, Leong Lee, Cyriac Kandoth, Jennifer Leopold, Ronald L. Frank

Computer Science Faculty Research & Creative Works

Protein 3D structure prediction has always been an important research area in bioinformatics. In particular, the prediction of secondary structure has been a well-studied research topic. Despite the recent breakthrough of combining multiple sequence alignment information and artificial intelligence algorithms to predict protein secondary structure, the Q3 accuracy of various computational prediction algorithms rarely has exceeded 75%. In a previous paper [1], this research team presented a rule-based method called RT-RICO (Relaxed Threshold Rule Induction from Coverings) to predict protein secondary structure. The average Q3 accuracy on the sample datasets using RT-RICO was 80.3%, an improvement over comparable computational methods. …


On Transport Protocol Performance Measurement Over 10gbps High Speed Optical Networks, Yixin Wu, Suman Kumar, Seung Jong Park Nov 2009

On Transport Protocol Performance Measurement Over 10gbps High Speed Optical Networks, Yixin Wu, Suman Kumar, Seung Jong Park

Computer Science Faculty Research & Creative Works

With the integration of IP and optical technology, fast optical network (of the order of 10Gbps) has emerged to support international research cooperation such as massive scientific data transfer and next generation Internet related research. Therefore, it is important to analyze the measurement issues to guide the high-speed transport protocol research for high-speed optical network of the order of 10Gbps. The objectives of this paper are as follows: i) determine the suitability of TCP parameters such as Jumbo Frame size, TCP sender and receiver buffer sizes; ii) evaluate TCP performance measurement tools and emulation tools over 10Gbps high speed optical …


Adaptive Distributed Fair Scheduling For Multiple Channels In Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani, Steve Eugene Watkins, James W. Fonda Nov 2009

Adaptive Distributed Fair Scheduling For Multiple Channels In Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani, Steve Eugene Watkins, James W. Fonda

Electrical and Computer Engineering Faculty Research & Creative Works

A novel adaptive and distributed fair scheduling (ADFS) scheme for wireless sensor networks (WSN) in the presence of multiple channels (MC-ADFS) is developed. The proposed MC-ADFS increases available network capacity and focuses on quality-of-service (QoS) issues. when nodes access a shared channel, the proposed MC-ADFS allocates the channel bandwidth proportionally to the packet's weight which indicates the priority of the packet's flow. The packets are dynamically assigned to channels based on the packet weight and current channel utilization. The dynamic assignment of channels is facilitated by use of receiver-based allocation and alternative routes. Moreover, MC-ADFS allows the dynamic allocation of …


Reinforcement-Learning-Based Output-Feedback Control Of Nonstrict Nonlinear Discrete-Time Systems With Application To Engine Emission Control, Peter Shih, Brian C. Kaul, Jagannathan Sarangapani, J. A. Drallmeier Oct 2009

Reinforcement-Learning-Based Output-Feedback Control Of Nonstrict Nonlinear Discrete-Time Systems With Application To Engine Emission Control, Peter Shih, Brian C. Kaul, Jagannathan Sarangapani, J. A. Drallmeier

Electrical and Computer Engineering Faculty Research & Creative Works

A novel reinforcement-learning-based output adaptive neural network (NN) controller, which is also referred to as the adaptive-critic NN controller, is developed to deliver the desired tracking performance for a class of nonlinear discrete-time systems expressed in nonstrict feedback form in the presence of bounded and unknown disturbances. The adaptive-critic NN controller consists of an observer, a critic, and two action NNs. The observer estimates the states and output, and the two action NNs provide virtual and actual control inputs to the nonlinear discrete-time system. The critic approximates a certain strategic utility function, and the action NNs minimize the strategic utility …


Reliability Analysis For The Advanced Electric Power Grid: From Cyber Control And Communication To Physical Manifestations Of Failure, Ayman Z. Faza, Sahra Sedigh, Bruce M. Mcmillin Sep 2009

Reliability Analysis For The Advanced Electric Power Grid: From Cyber Control And Communication To Physical Manifestations Of Failure, Ayman Z. Faza, Sahra Sedigh, Bruce M. Mcmillin

Electrical and Computer Engineering Faculty Research & Creative Works

The advanced electric power grid is a cyber-physical system comprised of physical components, such as transmission lines and generators, and a network of embedded systems deployed for their cyber control. The objective of this paper is to qualitatively and quantitatively analyze the reliability of this cyber-physical system. The original contribution of the approach lies in the scope of failures analyzed, which crosses the cyber-physical boundary by investigating physical manifestations of failures in cyber control. As an example of power electronics deployed to enhance and control the operation of the grid, we study Flexible AC Transmission System (FACTS) devices, which are …


T-Plausibility: Semantic Preserving Text Sanitization, Wei Jiang, Mummoorthy Murugesan, Chris Clifton, Luo Si Aug 2009

T-Plausibility: Semantic Preserving Text Sanitization, Wei Jiang, Mummoorthy Murugesan, Chris Clifton, Luo Si

Computer Science Faculty Research & Creative Works

Text documents play significant roles in decision making and scientific research. Under federal regulations, documents (e.g., pathology records) containing personally identifiable information cannot be shared freely, unless properly sanitized. Generally speaking, document sanitization consists of finding and hiding personally identifiable information. The first task has received much attention from the research community, but the main strategy for the second task has been to simply remove personal identifiers and very sensitive information (e.g., diseases and treatment). It is not hard to see that if important information (e.g., diagnoses and personal medical histories) is completely removed from pathology records, these records are …


Consistency Management Strategies For Data Replication In Mobile Ad Hoc Networks, Takahiro Hara, Sanjay Kumar Madria Jul 2009

Consistency Management Strategies For Data Replication In Mobile Ad Hoc Networks, Takahiro Hara, Sanjay Kumar Madria

Computer Science Faculty Research & Creative Works

In a mobile ad hoc network, data replication drastically improves data availability. However, since mobile hosts' mobility causes frequent network partitioning, consistency management of data operations on replicas becomes a crucial issue. In such an environment, the global consistency of data operations on replicas is not desirable by many applications. Thus, new consistency maintenance based on local conditions such as location and time need to be investigated. This paper attempts to classify different consistency levels according to requirements from applications and provides protocols to realize them. We report simulation results to investigate the characteristics of these consistency protocols in a …


Rfid-Based Smart Freezer, Ahmet Soylemezoglu, Maciej Jan Zawodniok, Jagannathan Sarangapani Jul 2009

Rfid-Based Smart Freezer, Ahmet Soylemezoglu, Maciej Jan Zawodniok, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

This paper presents a novel radio-frequency identification (RFID)-based smart freezer using a new inventory-management scheme for extremely low temperature environments. The proposed solution utilizes backpressure inventory control, systematic selection of antenna configuration, and antenna power control. The proposed distributed-inventory-control (DIC) scheme dictates the amount of items transferred through the supply chain. when a high item visibility is ensured, the control scheme maintains the desired level of inventory at each supply-chain echelon. The performance of the DIC scheme is guaranteed using a Lyapunov-based analysis. The proposed RFID antenna-configuration design methodology coupled with locally asymptotically stable distributed power control ensures a 99% …


Incentive Based Routing Protocol For Mobile Peer To Peer Networks, Anil Jade, Sanjay Kumar Madria, Mark Linderman May 2009

Incentive Based Routing Protocol For Mobile Peer To Peer Networks, Anil Jade, Sanjay Kumar Madria, Mark Linderman

Computer Science Faculty Research & Creative Works

Incentive models are becoming increasingly popular in Mobile Peer to Peer Networks (M-P2P) as these models entice node participation in return for a virtual currency to combat free riding and to effectively manage constraint resources in the network. Many routing protocols proposed are based on best effort data traffic policy, such as the shortest route selection (hop minimization). Using virtual currency to find a cost effective optimal route from the source to the destination, while considering Quality of Service (QoS) aspects such as bandwidth and service capacity constraints for data delivery, remains a challenging task due to the presence of …


Dynamic Channel Allocation In Wireless Networks Using Adaptive Learning Automata, Behdis Eslamnour, Maciej Jan Zawodniok, Jagannathan Sarangapani Apr 2009

Dynamic Channel Allocation In Wireless Networks Using Adaptive Learning Automata, Behdis Eslamnour, Maciej Jan Zawodniok, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

The bandwidth utilization of a single channel-based wireless networks decreases due to congestion and interference from other sources and therefore transmission on multiple channels are needed. In this paper, we propose a distributed dynamic channel allocation scheme for wireless networks using adaptive learning automata whose nodes are equipped with single radio interfaces so that a more suitable channel can be selected. The proposed scheme, adaptive pursuit reward-inaction, runs periodically on the nodes, and adaptively finds the suitable channel allocation in order to attain a desired performance. A novel performance index, which takes into account the throughput and the energy consumption, …


Neural Network Control Of Mobile Robot Formations Using Rise Feedback, Jagannathan Sarangapani, Travis Alan Dierks Apr 2009

Neural Network Control Of Mobile Robot Formations Using Rise Feedback, Jagannathan Sarangapani, Travis Alan Dierks

Electrical and Computer Engineering Faculty Research & Creative Works

In this paper, an asymptotically stable (AS) combined kinematic/torque control law is developed for leader-follower-based formation control using backstepping in order to accommodate the complete dynamics of the robots and the formation, and a neural network (NN) is introduced along with robust integral of the sign of the error feedback to approximate the dynamics of the follower as well as its leader using online weight tuning. It is shown using Lyapunov theory that the errors for the entire formation are as and that the NN weights are bounded as opposed to uniformly ultimately bounded stability which is typical with most …


A Multi-Interface Multi-Channel Routing (Mmcr) Protocol For Wireless Ad Hoc Networks, Reghu Anguswamy, Maciej Jan Zawodniok, Jagannathan Sarangapani Apr 2009

A Multi-Interface Multi-Channel Routing (Mmcr) Protocol For Wireless Ad Hoc Networks, Reghu Anguswamy, Maciej Jan Zawodniok, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

Multiple non-interfering channels are available in 802.11 and 802.15.4 based wireless networks. Capacity of such channels can be combined to achieve a better performance thus providing a higher quality of service (QoS) than for a single channel network. However, existing routing protocols often are not suited to fully take advantage of these channels. The proposed multi-interface multi-channel routing (MMCR) protocol considers various QoS parameters such as throughput, end-to-end delay, and energy utilization as a single unified cost metric and identifies the route that optimizes the cost metric and balances the traffic among the channels on a per flow basis. Multipoint …


Generalized Neuron Based Secure Media Access Control Protocol For Wireless Sensor Networks, Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy, Abhishek V. Thakur, Sanjay Kumar Madria Mar 2009

Generalized Neuron Based Secure Media Access Control Protocol For Wireless Sensor Networks, Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy, Abhishek V. Thakur, Sanjay Kumar Madria

Electrical and Computer Engineering Faculty Research & Creative Works

Security plays a pivotal role in most applications of wireless sensor networks. It is common to find inadequately secure networks confined only to controlled environments. The issue of security in wireless sensor networks is a hot research topic for over a decade. This paper presents a compact generalized neuron (GN) based medium access protocol that renders a CSMA/CD network secure against denial-of-service attacks launched by adversaries. The GN enhances the security by constantly monitoring multiple parameters that reflect the possibility that an attack is launched by an adversary. Particle swarm optimization, a popular bio-inspired evolutionary-like optimization algorithm is used for …


Information Flow Properties For Cyber-Physical Systems, Rav Akella Jan 2009

Information Flow Properties For Cyber-Physical Systems, Rav Akella

Masters Theses

"In cyber-physical systems, which are the integrations of computational and physical processes, security properties are difficult to enforce. Fundamentally, physically observable behavior leads to violations of confidentiality. This work analyzes certain noninterference based security properties to ensure that interactions between the cyber and physical processes preserve confidentiality. A considerable barrier to this analysis is the representation of physical system interactions at the cyber-level. This thesis presents encoding of these physical system properties into a discrete event system and represents the cyber-physical system using Security Process Algebra (SPA). The model checker, Checker of Persistent Security (CoPS) shows Bisimulation based NonDeducibility on …


Satellite Photography: Instrumental, Rhetorical, Affective?, Irangi Kaushalya Egodapitiya Jan 2009

Satellite Photography: Instrumental, Rhetorical, Affective?, Irangi Kaushalya Egodapitiya

Masters Theses

"This study examines how tsunami satellite images operate and could provoke various interpretations. The goal of this research project is to study whether the interpretation of tsunami satellite images could extend beyond scientific features to affective messages. Primarily based on the satellite images of Sri Lanka taken before and during the 2004 tsunami, this study analyses: How could mechanical satellite images, taken automatically by a machine in orbit, become an object of profound emotional meaning?; How do viewer's experiences, knowledge, and discourse affect their interpretations of mechanical artifacts?; How are tsunami satellite images connected to affective responses by viewers?; How …


Exploring The Use Of A Commercial Game Engine For The Development Of Educational Software, Hussain Alafaireet Jan 2009

Exploring The Use Of A Commercial Game Engine For The Development Of Educational Software, Hussain Alafaireet

Masters Theses

"Three-dimensional visualization and simulation environments are becoming increasingly important in both industrial and educational environments. However, developing these simulations can be a difficult and expensive task. Herein we explore the use of a commercial game engine to develop a 3-D, interactive computer game designed to teach players about the anatomy of a frog. The goal of this project is threefold: 1) to develop high-fidelity virtual reality educational software with a limited budget and limited personnel, 2) to define a software development process by which similar simulations can be developed, and 3) to explore the benefits that these simulations provide to …


Integration Of A Gis Learning System Into Civil Engineering Curricula: An Evaluation, Basanta Tandon Jan 2009

Integration Of A Gis Learning System Into Civil Engineering Curricula: An Evaluation, Basanta Tandon

Masters Theses

"An evaluation of a web-based e-learning system to facilitate integration of Geographical Information Systems (GIS) into the Civil Engineering curriculum was conducted. The principal goals of the evaluation were to examine the effectiveness of the learning system and to develop a preliminary model to describe how students interact with the learning system. Quantitative and qualitative data were collected from 80 students who participated in a geotechnical engineering laboratory session, which covered soil borrow sites. Students rated the laboratory session as significantly more effective for learning, a nd more motivational than the class text. They also rated the lab significantly more …


The Effects Of Technology On Literacy(S), Thomas Glen Petersen Jan 2009

The Effects Of Technology On Literacy(S), Thomas Glen Petersen

Masters Theses

"One of the challenges when measuring the effects of technology on literacy(s) is finding a control group where technology; does not play a major role in the culture. The Amish successfully live in a Technocracy where mechanical/electronic tools are used only when absolutely necessary; the Amish are not dependent on them for survival. The crux of the Amish philosophy is humility, serving the community and serving God. Ironically, they have suffered tremendous repercussions for adopting a wholesome, selfless lifestyle which is contrary to most popular world views, regardless of religious or spiritual views"--Purpose, page 40.


An Improved Upfc Control For Oscillation Damping, Jagannathan Sarangapani, Mariesa Crow, Jianjun Guo Jan 2009

An Improved Upfc Control For Oscillation Damping, Jagannathan Sarangapani, Mariesa Crow, Jianjun Guo

Electrical and Computer Engineering Faculty Research & Creative Works

This paper proposes a new control approach for a unified power flow controller (UPFC) for power system oscillation damping. This control is simple to implement, yet is valid over a wide range of operating conditions. It is also effective in the presence of multiple modes of oscillation. The proposed control is implemented in several test systems and is compared against a traditional PI control.


Automated Offspring Sizing In Evolutionary Algorithms, André Chidi Nwamba Jan 2009

Automated Offspring Sizing In Evolutionary Algorithms, André Chidi Nwamba

Masters Theses

"Evolutionary Algorithms (EAs) are a class of algorithms inspired by biological evolution. EAs are applicable to a wide range of problems; however, there are a number of parameters to set in order to use an EA. The performance of an EA is extremely sensitive to these parameter values; setting these parameters often requires expert knowledge of EAs. This prevents EAs from being more widely adopted by nonexperts. Parameter control, the automation of dynamic parameter value selection, has the potential to not only alleviate the burden of parameter tuning, but also to improve performance of EAs on a variety of problem …


Comparison Of Dashboard-Based And Balanced Scorecard-Based Corporate Performance Management System, Lin Zhu Jan 2009

Comparison Of Dashboard-Based And Balanced Scorecard-Based Corporate Performance Management System, Lin Zhu

Masters Theses

"Under current hypercompetitive and technology driven economic environment, more companies are using a corporate performance management (CPM) system to gain more accurate understandings of the company goals and strategies and to craft methods of achieving those goals and strategies. While CPM systems are generally implemented in two approaches: dashboard approach and scorecard approach, very few studies examine the effectiveness of each type of CPM systems implementation. Therefore, the main objective of this study is to assess the effectiveness of a dashboard based and a balanced scorecard based corporate performance management system. The effectiveness is examined through management effectiveness, degree of …